On Tue, Jun 09, 2015 at 07:23:43PM +0000, Viktor Dukhovni wrote:
> On Tue, Jun 09, 2015 at 02:26:20PM -0400, Forrest wrote:
> 
> > >So that log entry might be for the submission port, unless you've
> > >configured it along the lines above.
> > 
> > I believe this is already set in my master.cf, which is:
> > 
> > smtp      inet  n       -       n       -       -       smtpd
> > submission inet n       -       n       -       -       smtpd
> >         -o syslog_name=postfix/submission
> >         -o smtpd_tls_security_level=may
> 
> In that case, consider disabling SASL auth by default (main.cf),
> and enabling it only for the submission service.  That should
> eliminate all the port 25 SASL attacks.

This is something I've recently had to do to allow mail from "the world"
while firewalling off everything except "nearby" to authenticate via the
submission port.  The bruteforcers were overwhelming my authentication
database.

I just added "-o smtpd_sasl_auth_enable=no" to the smtp entry in
master.cf.  This led to a lot of support calls from users with outlook
set to use port 25 for submission.

I've been looking for, but haven't found, yet, a postfix option that
would delay x seconds after a failed auth attempt.  We still use
fail2ban, but the botnets are just too large.

-- 
Scott Lambert                    KC5MLE                       Unix SysAdmin
lamb...@lambertfam.org

Reply via email to